{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T05:28:43Z","timestamp":1737523723551,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540768364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76837-1_54","type":"book-chapter","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T10:25:50Z","timestamp":1194344750000},"page":"497-507","source":"Crossref","is-referenced-by-count":0,"title":["Design and Realization of Multi-protocol Communication Model for Network Security Management System"],"prefix":"10.1007","author":[{"given":"Shouling","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jiaming","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Erfani, S.: Security Management System Functional Architecture for Enterprise Network. 0-7803-5864-3, IEEE, Honolulu, HI, 977-978 (2000)","DOI":"10.1109\/NOMS.2000.830465"},{"key":"54_CR2","first-page":"548","volume-title":"ICHIT 2006","author":"Y. Lim","year":"2006","unstructured":"Lim, Y., Kim, M., Jeong, A.: An Enterprise Security Management System as an ASP Solution. In: ICHIT 2006, 0-7695-2674-8\/06, Cheju Island, Korea, pp. 548\u2013555. IEEE Computer Society Press, Los Alamitos (2006) 0-7695-2674-8\/06"},{"key":"54_CR3","unstructured":"JMX 1.2 Specification. Sun Microsystems,Inc. (April 2007), http:\/\/java.sun.com\/javase\/technologies\/core\/mntr-mgmt\/javamanagement\/"},{"key":"54_CR4","unstructured":"Sullins, B.G., Whipple, M.B.: JMX in Action. Manning Publications Company, Greenwich, Connecticut (2002)"},{"key":"54_CR5","unstructured":"Perry, S.J.: Java Management Extensions. O\u2019Reilly, Sebastopol, USA\u00a0(June 2002)"},{"key":"54_CR6","unstructured":"Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol Version 3.0 (November 1996), http:\/\/home.netscape.com\/eng\/ssl3\/draft302.txt"},{"key":"54_CR7","unstructured":"Dong, S., Tan, Y., Zhang, L.: Extensible network security policy management system. Journal of Dalian University of Technology, China, 172-175 (2005)"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Prem Kumar, G., Venkataram, P.: Security management architecture for access control to network resources. IEE Proc.-Comput. Digit. Tech.\u00a0144(6) (November 1997)","DOI":"10.1049\/ip-cdt:19971665"},{"key":"54_CR9","volume-title":"On Measuring SSL-based Secure Data Transfer with Handheld Devices","author":"D. Berbecaru","year":"2005","unstructured":"Berbecaru, D.: On Measuring SSL-based Secure Data Transfer with Handheld Devices. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"54_CR10","volume-title":"Providing Secure End-to-End Session Tracking in Distributed Multi-Protocol Environments","author":"F. Cao","year":"2006","unstructured":"Cao, F., Dini, P.: Providing Secure End-to-End Session Tracking in Distributed Multi-Protocol Environments. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"54_CR11","volume-title":"Secure Blue: An Architecture for a Scalable, Reliable High Volume SSL Internet Server","author":"R. Mraz","year":"2001","unstructured":"Mraz, R.: Secure Blue: An Architecture for a Scalable, Reliable High Volume SSL Internet Server. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"54_CR12","doi-asserted-by":"crossref","unstructured":"Epstein, S.: Using Multi-Protocol Encapsulation Technology to Develop Optimum Data Broadcast Systems. 2000 The Institution of Electrical Engineers (2000)","DOI":"10.1049\/ic:20000165"},{"key":"54_CR13","volume-title":"Policy Modeling and Refinement for Network Security Systems","author":"J.P. Albuquerque de","year":"2005","unstructured":"de Albuquerque, J.P., Krumm, H., de Geus, P.L.: Policy Modeling and Refinement for Network Security Systems. IEEE Computer Society Press, Los Alamitos (2005)"}],"container-title":["Lecture Notes in Computer Science","Advanced Parallel Processing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76837-1_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T03:41:49Z","timestamp":1737517309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76837-1_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540768364"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76837-1_54","relation":{},"subject":[]}}